|
ECS-235A, Lecture 13, October 19, 2022
|
|
This is the video of the thirteenth lecture. It's crude as I made it from my laptop, as the room has no video recording. Ah, well . . .
|
|
This workshop shows attendees how to use remote computers to run their analyses, work with the output files, and copy the results back to their laptop and desktop computers. We will discuss input and…
|
|
ECS 153 Spring 2021. Computer Security. This covers ACLs, C-Lists, locks and keys, secret sharing, and begins rings. The video begins at 1:42 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers the rest of penetration testing and begins vulnerability models. The video begins at 5:05 from the beginning.
|
|
Foundations of Computer and Information Security. This covers DRM, RBAC, and begins Traducement. The class starts at 10:07 into the video.
|
|
|
|
ECS40 Lecture 2015-02-25 at 11:00
|
|
ECS40 Lecture 2015-01-14 at 11:00
|
|
ECS40 Lecture 2015-01-07 at 11:00
|